From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform., , , , и . IEEE Trans. Inf. Forensics Secur., (2022)Transplantation Attack: Analysis and Prediction., , , и . SecureComm (2), том 153 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 367-374. Springer, (2014)DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5., , , , , и . Comput. Secur., (2019)CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms., , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (1): 254-269 (января 2024)SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions., , , , , и . MSN, стр. 387-394. IEEE, (2020)A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network., , , , и . MSN, стр. 818-824. IEEE, (2021)TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors., , , , , и . SenSys, стр. 271-284. ACM, (2020)MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring., , , , и . ICISC, том 7839 из Lecture Notes in Computer Science, стр. 78-91. Springer, (2012)WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps., , , , и . ICISC, том 8949 из Lecture Notes in Computer Science, стр. 255-268. Springer, (2014)Once Root Always a Threat: Analyzing the Security Threats of Android Permission System., , , , и . ACISP, том 8544 из Lecture Notes in Computer Science, стр. 354-369. Springer, (2014)